TryHackMe: Advent of Cyber - Day 19 - Something Phishy Is Going On

1 minute read

This is a write up for the Day 19 - Something Phishy Is Going On challenge in the Advent of Cyber room on TryHackMe. Some tasks may have been omitted as they do not require an answer.


Who was the email sent to? (Answer is the email address)

Answer: elfmcphearson@tbfc.com

Phishing emails use similar domains of their targets to increase the likelihood the recipient will be tricked into interacting with the email. Who does it say the email was from? (Answer is the email address)

Answer: customerservice@t8fc.info

Sometimes phishing emails have a different reply-to email address. If this email was replied to, what email address will receive the email response?

Answer: fisher@tempmailz.grinch

Less sophisticated phishing emails will have typos. What is the misspelled word?

Answer: stright

We can decode the base64 email message with CyberChef.

Answer: https://89xgwsnmo5.grinch/out/fishing/

View the email source code. There is an unusual email header. What is the header and its value?

Answer: X-GrinchPhish: >;^)

You received other reports of phishing attempts from other colleagues. Some of the other emails contained attachments. Open attachment.txt. What is the name of the attachment?

head attachment.txt

Answer: password-reset-instructions.pdf

password-reset-instructions.pdf

mcskidy@elfmode$ cat attachment-base64-only.txt | base64 -d > file.pdf will decode the output and create a PDF.

Opening the PDF reveals the flag.

Answer: THM{A0C_Thr33_Ph1sh1ng_An4lys!s}

Recap

In this task we learnt:

  • About Phishing and investigating Email Headers
  • Reconstructing base64 encoded artifacts

Updated: